FIPS 140-3 precludes the use of invalidated cryptography for the cryptographic protection of sensitive or valuable data within federal systems. Unvalidated cryptography is viewed by NIST as providing no protection to the information or data, in effect the data would be considered unprotected plaintext. If the agency specifies that the information or data be cryptographically protected, then FIPS 140-3 is applicable. In essence, if cryptography is required, then it must be validated. Cryptographic modules that have been approved for classified use may be used in lieu of modules that have been validated against the FIPS 140-3 standard.
The cryptographic module used have at least one validated digital signature function. This validated hash algorithm must be used to generate digital signatures for all cryptographic security function within the product being evaluated.
This requirement also applies to Zero Trust initiatives.
Check
Verify the operating system is configured to use a FIPS-validated cryptographic module to provision digital signatures.
If the operating system is not configured to use a FIPS-validated cryptographic module to provision digital signatures, this is a finding.
Fix
Configure the operating system to use a FIPS-validated cryptographic module to provision digital signatures.